Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Separable Encryption Domain Information Hiding Method

An information hiding and encryption domain technology, applied to key distribution, can solve problems such as uncertainty, data extraction image recovery error, limited effective embedding capacity, etc.

Active Publication Date: 2021-02-05
TAIYUAN UNIVERSITY OF SCIENCE AND TECHNOLOGY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the encryption process hides the content of the original data, making the signal highly uneven and uncertain, and the information entropy reaches the maximum value from the perspective of visual information theory, which undoubtedly increases the difficulty of information embedding.
[0003] In 2011, Professor Zhang Xinpeng of Shanghai University proposed the concept of encryption domain information hiding for the first time. The carrier image is encrypted with a stream cipher and then divided into blocks, and the spatial domain structure characteristics of the image block are cleverly used to hide the encryption domain. However, under the premise of strict non-destructive The effective embedding capacity is limited, and data extraction and image restoration errors will occur when the embedding capacity increases
However, the improvement of embedded capacity still cannot meet the needs of existing users
With the increasing demand for data security, many problems in encrypted domain information hiding in terms of reversibility, embedding capacity, and algorithm execution efficiency still need to be further studied.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Separable Encryption Domain Information Hiding Method
  • A Separable Encryption Domain Information Hiding Method
  • A Separable Encryption Domain Information Hiding Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] In order to make the purpose, features and advantages of the present invention more comprehensible, specific implementations of the present invention will be described in detail below.

[0081] We choose Matlab as the software platform, and programming realizes the design of the scheme of the present invention. The implementation process selects the 512×512 standard test image “Lena” as the image to be protected, assuming that the selected observation rate MR=0.25, and the block size B=8.

[0082] The specific operation steps are:

[0083] Ⅰ. The image encryption and secret information embedding part at the sending end, including the following steps:

[0084] The first step is the encryption process based on Block Compressive Sensing (BCS):

[0085] (1). Read in a size 512 * 512 image I that needs to be protected, and divide the image into a plurality of non-overlapping, 8 * 8 size image blocks;

[0086] (2). Arrange each image block into a 64×1 column vector x i , i ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a separable encryption domain information hiding method, which belongs to the technical field of information hiding. The characteristics are: first, read in the image to be protected and divide it into blocks, select the appropriate observation rate to observe it according to the storage space and user needs, and quantize and encode the obtained observation value, and at the same time, the Secret information (such as copyright, identity authentication, etc.) is embedded in the lower 4 bits of each observation value, thereby generating a ciphertext image containing secret information. In the inventive method, the extraction of the secret information and the reconstruction of the protected image are separable. If the user has the extraction key, the secret information can be directly extracted from the encrypted ciphertext image losslessly; if the user is authorized to reconstruct the image, the protected image can be reconstructed with high quality; if both are available, then Secret information and reconstructed images can be obtained simultaneously.

Description

technical field [0001] The invention belongs to the technical field of information hiding, and in particular relates to a separable encryption domain information hiding method. Background technique [0002] With the popularization of cloud computing, more and more image data involving personal privacy are stored and processed on open cloud platforms, such as credit records, medical records, court records, private property records, military fields, business information, etc. How to protect the security of these private data has become one of the most important and urgent research topics at present. Traditional encryption algorithms can convert user data into ciphertext for transmission and storage in the network, thereby hiding the content of user data well; information hiding technology can hide certain secret information (such as copyright, identity authentication, etc.) In the ciphertext, so as to realize the management of ciphertext data retrieval, classification or auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N19/467H04L29/06H04L9/08H04N19/176
CPCH04L9/0863H04L63/0428H04N19/176H04N19/467
Inventor 刘丽王安红李志宏吕琪牛志伟
Owner TAIYUAN UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products